Cryptojacking Meets IoT

This webcast is presented in two time-zones:

  • Pacific Time

    Registration

    Thursday, July 19, 2018
    11:00AM-12:00PM PDT
    60 MINUTES, INCLUDING Q&A


  • British Time

    Registration

    Friday, July 20, 2018
    11:00AM-12:00PM BST
    60 MINUTES, INCLUDING Q&A




Brought to you by:

“Cryptojacking" is the latest trend for criminals, who hijack your computers, install cryptocurrency miners, and use stolen information from your databases to set up wallets for illicit funds transfers. Hackers are busily infecting the Internet of Things, developing new IoT bonets, following the publication of the Mirai source code and the “success” of Reaper and Satori.

What happens when cryptojacking meets the Internet of Things? By 2020, researchers estimate there will be 30 billion IoT devices in the world. Many of these devices are highly vulnerable to simple attacks based on weak passwords and unpatched vulnerabilities, and poorly monitored—a perfect recipe for criminals to install mining software and lurk, racking up money.

In this webinar, we'll show you a cryptojacking attack, complete with screenshots of the criminal’s web surfing history and falsified documents uncovered through forensic analysis. Then we'll analyze what happens when IoT devices are infected with cryptojacking. What are the risks to your organization? How can you detect and prevent IoT cryptojacking attacks?


Speaker:

Sherri Davidoff

Sherri Davidoff has 15 years of experience as a cyber security professional, specializing in digital forensics, penetration testing and security awareness training. Sherri has authored courses for the SANS Institute and Black Hat, and conducted security training for the American Bar Association, Department of Defense, Google, Comcast, Los Alamos National Laboratories, and many others. Sherri Davidoff is the CEO of LMG Security and the co-author of "Network Forensics: Tracking Hackers Through Cyberspace".



Sponsor Speaker:

Paul Ducklin

Paul Ducklin, Senior Technologist, has been many things at Sophos: programmer, malware analyst, technical supporter, public speaker, security evangelist, and now proselytiser. Paul spends most of his time writing for Sophos's award-winning community website, Naked Security, where he has built up a global reputation as the go-to guy for explaining even the most technical issues.

UpcomingEvents

ShowCoverage

 

StayConnected

Sign up to receive information about upcoming Black Hat events including Briefings, Trainings, speakers, and important event updates.

 

Sustaining Partners